4.7 Article

Constant-round authenticated and dynamic group key agreement protocol for D2D group communications

期刊

INFORMATION SCIENCES
卷 503, 期 -, 页码 61-71

出版社

ELSEVIER SCIENCE INC
DOI: 10.1016/j.ins.2019.06.067

关键词

Constant-Round; Device-to-device communications; Dynamic group key agreement; Out-of-coverage; Privacy preservation

资金

  1. National Natural Science Foundation of China [61772008]
  2. Science and Technology Top-notch Talent Support Project in Guizhou Province Department of Education [Qjan Education Combined KY word [2016]060]
  3. Guizhou Province Science and Technology Major Special Plan [30183001]
  4. Guizhou Provincial Science and Technology Plan Project [[2017]5788]
  5. Ministry of Education-China Mobile Research Fund Project [MCM20170401]
  6. Guizhou University Fostering Project [[2017]5788]
  7. Joint Science and Technology Foundation of Guizhou Province [LKT201216, LH20147476]

向作者/读者索取更多资源

The device-to-device (D2D) communication exhibits its potential capacity in the next generation of mobile communication networks and wireless systems (5G). One of the most important applications of D2D is to form a group of registered devices without the help of the existing base stations and extend the network-absent D2D communications network. There have been couple of great works on security and privacy in D2D communications, however, they are short of secure and privacy-preserving D2D group communications that would cause serious restrictions on their widespread usage. Hence, how to realize the mutual communication without the help of the third-party devices is a big challenge for D2D group communications. In this paper, a dynamic group key agreement protocol is proposed to realize communication concentrating on security and privacy by establishing a constant-round authentication in D2D group communications. In this new protocol, the D2D users communicate with each other without NodeB (eNB) or basic stations, while securely consulting a common D2D group session key mutually. In addition, a formal computational and communication overhead to show its security and feasibility is also processed. Finally, the evaluation of security and feasibility of our protocol shows that the proposed scheme is applicable to the performance requirements of D2D group communications. (C) 2019 Published by Elsevier Inc.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据